On Friday 16 May 2008 12:31:10 am Zak B. Elep wrote:
> For those who are not yet aware of the situation on Debian and OpenSSL:
>
> http://blog.zakame.net/news/openssl-remote-dsa-1571

Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check)
   
  This script is Copyright (C) 2008 Tenable Network Security, Inc
  This plugin is currently only available to the direct feed users

  Family  Gain a shell remotely
  Nessus Plugin ID  32321
  Bugtraq ID  29179
  CVE ID  CVE-2008-0166

  Description:

   Synopsis :
 
 The remote SSL certificate uses a weak key.
 
 Description :
 
 The remote x509 certificate on the remote SSL server 
 has been generated on a Debian or Ubuntu system which 
 contains a bug in the random number generator of its OpenSSL 
 library.
 
 The problem is due to a Debian packager removing nearly all
 sources of entropy in the remote version of OpenSSL.
 
 An attacker can easily obtain the private part of the remote
 key and use this to set up decipher the remote session or
 set up a man in the middle attack.
 
 Solution :
 
 Consider all cryptographic material generated on the remote host
 to be guessable. In particuliar, all SSH, SSL and OpenVPN key
 material should be re-generated.
 
 See also :
 
 http://www.nessus.org/u?5d01bdab (Debian)
 http://www.nessus.org/u?f14f4224 (Ubuntu)
 
 Risk factor :
 
 Critical / CVSS Base Score : 10.0
 (AV:R/AC:L/Au:NR/C:C/A:C/I:C/B:C)
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
http://lists.linux.org.ph/mailman/listinfo/plug
Searchable Archives: http://archives.free.net.ph
  • [plug] OpenSSL Ouch Zak B. Elep
    • Re: [plug] OpenSSL Ouch (Debian and all derivatives) Michael Cole

Reply via email to